wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Email Privacy

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
78 Reads

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message.

An email has to go through potentially untrustworthy intermediate computers (email servers, ISPs) before reaching its destination, and there is no way to verify if it was accessed by an unauthorized entity. Through the process of information being sent from the user's computer to the email service provider, data acquisition is taking place, most of the time without the user knowing. There are certain data collection methods (routers) that are used for data privacy concerns, but there are others that can be harmful to the user. This is different from a letter sealed in an envelope, where, by close inspection of the envelope, it might be possible to determine if it had been previously opened. In that sense, an email is much like a postcard, the contents of which are visible to anyone who handles it.

There are certain technological workarounds that make unauthorized access to email difficult, if not impossible. However, since email messages frequently cross national boundaries, and different countries have different rules and regulations governing who can access an email, email privacy is a complicated issue.

Companies may have email policies requiring employees to refrain from sending proprietary information and company classified information through personal emails or sometimes even work emails. Co-workers are restricted from sending private information such as company reports, slide show presentations with confidential information, or email memos.


Comments ()


Sign in

Read Next

Data Acquisition in Cyber Forensics

Blog banner

Buffering

Blog banner

Memory Management

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Photorec - media recovery tool

Blog banner

Harsh Rathod

Blog banner

Ethical Hacking

Blog banner

File Management

Blog banner

Virtual Memory

Blog banner

PPT methodology

Blog banner

Traveling

Blog banner

indian premier league

Blog banner

Rain

Blog banner

How to write a cover letter

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Career v/s Job : Choose your passion

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Device driver

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Computer security techniques

Blog banner

Ola

Blog banner

Emerging threats in cyber Forensics

Blog banner

Dos (Denial of service) Attack

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Internet of Things and cyber security

Blog banner

Why Data Security Is Important

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Virtual machine and virtualizing

Blog banner

The Evolution of Operating Systems

Blog banner

How Does SSO Works

Blog banner

A Journey By Train

Blog banner

SAVE TREES

Blog banner

Types of Hackers

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Functions of Operating System

Blog banner

bulk email software

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Full Disk Encryption

Blog banner

Challenges and risks in service operations

Blog banner